Verifiable privacy-preserving semantic retrieval scheme in the edge computing

被引:0
作者
Guo, Jiaqi [1 ,2 ]
Tian, Cong [1 ,2 ]
He, Qiang [3 ,4 ]
Zhao, Liang [1 ,2 ]
Duan, Zhenhua [1 ,2 ]
机构
[1] Xidian Univ, ICTT Lab, Xian 710071, Peoples R China
[2] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
[3] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[4] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Secure semantic retrieval; Secure kNN based on LWE; Result verification; Edge computing; SEARCHABLE ENCRYPTION;
D O I
10.1016/j.sysarc.2024.103289
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data outsourcing and retrieval. However, data outsourcing poses risks to data privacy. Although searchable encryption is proposed to secure search of outsourced data, existing schemes generally cannot meet the requirements of semantic search, and they also exhibit security risks and incur high search costs. In addition, edge servers may engage in malicious activities such as data tampering or forgery. Therefore, we propose a verifiable privacy-preserving semantic retrieval scheme named VPSR suitable for edge computing environments. We utilize the Doc2Vec method to extract text feature vectors and then convert them into matrix form to reduce storage space requirements for indexes, queries, and keys. We encrypt matrices using an improved secure k-nearest neighbor (kNN) algorithm based on learning with errors (LWE) and calculate text similarity by solving the Hadamard product between matrices. Additionally, we design an aggregable signature scheme and offload part of the result verification tasks to edge servers. Security and performance analysis results demonstrate that the VPSR scheme is suitable for edge computing environments with high encryption and search efficiency and low storage cost while ensuring security.
引用
收藏
页数:13
相关论文
共 38 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]   FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data [J].
Ananthi, M. ;
Sabitha, R. ;
Karthik, S. ;
Shanthini, J. .
SOFT COMPUTING, 2020, 24 (16) :12633-12642
[3]  
[Anonymous], 2001, Advances in Cryptology-ASIACRYPT 2001
[4]  
Brakerski Z, 2013, LECT NOTES COMPUT SC, V7778, P1, DOI 10.1007/978-3-642-36362-7_1
[5]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[6]   A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds [J].
Dai, Hua ;
Ji, Yan ;
Yang, Geng ;
Huang, Haiping ;
Yi, Xun .
IEEE ACCESS, 2020, 8 :4895-4907
[7]   Semantic-aware multi-keyword ranked search scheme over encrypted cloud data [J].
Dai, Hua ;
Dai, Xuelong ;
Yi, Xun ;
Yang, Geng ;
Huang, Haiping .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 147
[8]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, DOI 10.48550/ARXIV.1810.04805]
[9]   Semantic-Aware Searching Over Encrypted Data for Cloud Computing [J].
Fu, Zhangjie ;
Xia, Lili ;
Sun, Xingming ;
Liu, Alex X. ;
Xie, Guowu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2359-2371
[10]   Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing [J].
Gao, Hancheng ;
Huang, Haiping ;
Xue, Lingyan ;
Xiao, Fu ;
Li, Qi .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) :18414-18425